Now showing items 1-20 of 132

    • Recovery Based Architecture To Protect Hids Log Files Using Time Stamps 

      Khurana, Surinder Singh; Bansal, Divya; Sofat, Sanjeev (ACADEMY PUBLISHER, 2010)
      After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in ...
    • DWT-SVD Based robust digital image watermarking using adaptive median filter 

      Kumar, Ashok (Central University of Punjab, 2013)
      Feature Matching is one of the central issues of model-based recognition and an important component of most object recognition systems. The feature matching technique can be applied in image alignment, 3D secure reconstruction, ...
    • SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter 

      Khurana, Surinder Singh; Kaur, Nirmaljeet (Publishing India, 2014)
      The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
    • Comparison of classification techniques for intrusion detection dataset using WEKA 

      Garg, T.; Khurana, S.S. (Institute of Electrical and Electronics Engineers Inc., 2014)
      As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
    • Behavior analysis of LEACH protocol 

      Maurya, Prashant; Kaur, Amanpreet; Choudhary, Rohit (Institute of Electrical and Electronics Engineers Inc., 2014)
      A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
    • A review of De-facto MAC standard: IEEE 802.11 DCF 

      Hans, S.; Nayyar, A. (Institute of Electrical and Electronics Engineers Inc., 2014)
      Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by ...
    • Mobility model based performance analysis of DSDV mobile ad hoc routing protocol 

      Kaur, Amandeep (Institute of Electrical and Electronics Engineers Inc., 2014)
      Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the ...
    • Performance evaluation of manet routing protocols dsdv, tora enhanced tora 

      Kaur, Amandeep (Central University of Punjab, 2014)
      Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the ...
    • Performance evaluation of AODV based congestion control protocols in manet 

      Bhatia, Bandana (Central University of Punjab, 2014)
      The network in which the users communicate with each other by forming a temporary network without any centralized administration is known as ad hoc network. Every node in ad hoc network acts both as a host as well as a ...
    • Effect of improved IEEE 802.11 DCF on the performance of manets 

      Hans, Shifali (Central University of Punjab, 2014)
      Wireless networks have become the most crucial aspect of the today's wireless communication and information exchange. The rapid advancements in the wireless networking technologies have drastically modified our communication ...
    • Improved 2ACK scheme for reducing routing overhead in manet's 

      Dhiman, Deepika (Central University of Punjab, 2014)
      An autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are ...
    • A fault tolerable load balancing technique in cloud computing 

      Shiny (Central University of Punjab, 2014)
      As the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the ...
    • Analysis of leach protocol for lifetime optimization of wireless sensor networks 

      Maurya, Prashant (Central University of Punjab, 2014)
      A Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
    • A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model 

      Kaur, Amandeep; Mittal, Meenakshi (IJRET, 2014)
      Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified ...
    • AODV Based Congestion Control Protocols: Review 

      Bhatia, Bandana; Sood, Neha (IJCSIT, 2014)
      Ad- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They ...
    • Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing 

      Goyal, Renuka| Sidhu, Navjot (IJCSIT, 2014)
      Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users ...
    • Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing 

      Kanika; Sidhu, Navjot (IASIR, 2014)
      Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means ...
    • Impact of Denial of Service Attack on the Virtualization in Cloud Computing 

      Kanika; Sidhu, Navjot (2014)
      Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing ...
    • Security Enhancement in AODV protocol against Network Layer Attacks 

      Singh, Khushmeet; Kaur, Amanpreet (Excel India Publishers, 2014)
      A mobile Ad hoc network (MANET) is a wireless decentralized and self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. Each node plays role of both transmitter ...
    • Advance Stable Election Protocol in Wireless Sensor Network 

      Singh, Mandeep; Sidhu, Navjot (Excel India Publishers, 2014)
      Wireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering ...